Re: [PATCH 2/2 v4] SELinux: per-command whitelisting of ioctls

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 05/20/2015 05:22 PM, Paul Moore wrote:
>> @@ -64,6 +66,16 @@ struct avc_cache {
>>  	u32			latest_notif;	/* latest revocation notification */
>>  };
>>
>> +struct avc_operation_decision_node {
>> +	struct operation_decision od;
>> +	struct list_head od_list;
>> +};
> 
> Making this more generic may mean adding an extra field here to specify the 
> type of extension, e.g. ioctl commands.
> 
>> +struct avc_operation_node {
>> +	struct operation ops;
>> +	struct list_head od_head; /* list of operation_decision_node */
>> +};
> 
> As mentioned earlier, I think "operation" needs a name change; I tend to like 
> "extop" better, e.g. "avc_extop_decision_node" and "avc_extop_node".  Feel 
> free to suggest others.
> 
> The "operation" struct is named poorly as well; even if we stick with 
> "operation" elsewhere we really need to name this one better, it's way too 
> generic.

Don't want to bikeshed here, but I think "operation" is more readable
then "extop" (not evident what that means or even whether it is supposed
to be read as "ex-top" or "ext-op" or what).  "operation" at least is
meaningful and is a suitable generalization of "ioctl command".

>> @@ -429,11 +456,15 @@ int avtab_read_item(struct avtab *a, void *fp, struct
>> policydb *pol, printk(KERN_ERR "SELinux: avtab: entry has both access
>> vectors and types\n"); return -EINVAL;
>>  		}
>> +		if (val & AVTAB_OP) {
>> +			printk(KERN_ERR "SELinux: avtab: entry has operations\n");
>> +			return -EINVAL;
>> +		}
> 
> Another "operations" vs. "extop" or similar.  If we generalize, it would also 
> be nice to know what kind of extended operations, e.g. ioctl commands.
> 
> Further, beyond the extension type (ioctl), I think it would be nice to 
> include a size value in the binary policy.  With the current ioctl code it 
> would be 8/256, but we might want to make this variable in the future and it 
> would be nice not to have to bump the policy format again.

Not sure we can avoid changing the format version again regardless.
Note that we didn't even strictly need to increment the version this
time, as the new structure is only included in the binary policy if one
of the newly defined AVTAB_OP flag bits is set for the entry, but it was
still useful to define a new version so that userspace can tell whether
the kernel supports the extension and decide how to handle it if the
policy defined these operations but the kernel doesn't support enforcing
them. The same would be true of any future extension that used this
facility.


_______________________________________________
Selinux mailing list
Selinux@xxxxxxxxxxxxx
To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.




[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux